BloodHound
BloodHound is a popular open-source security tool used for analyzing and visualizing the Active Directory (AD) permissions and trust relationships in Windows environments.
The tool is designed to gather information about AD objects, such as users, groups, computers, and trusts, and then process and analyze this data to create a graph database that represents the relationships and permissions within the AD domain.
While BloodHound comes with default queries such as 'Find All Domain Admins', custom queries can be added to ~/.config/bloodhound/customqueries.json. I'll include a list of custom queries I've collected from various sources on the internet.
BloodHound/SharpHound
BloodHound.py is a Python-based BloodHound ingestor. It queries LDAP to gain information about the domain and the relationships between domain objects and outputs it in JSON files. The JSON files can then be ingested into BloodHound, allowing you to view the domain information graphically.
SharpHound.exe (C# version) and SharpHound.ps1 (PowerShell) has the same functionality as BloodHound.py but is meant to be run from the command line on a Windows-based computer. The output is also very similar to BloodHound.py, being JSON files that can be ingested into the BloodHound collector.
bloodhound.py -c All,LoggedOn -u weelee -p password -d weelee.zip --zipLast updated